• Title/Summary/Keyword: 정보보호 직업

Search Result 38, Processing Time 0.025 seconds

Development and Application of Elementary Information Security Education STEAM Program through Simulation Hacking Play Activities (모의해킹 놀이 활동을 통한 초등 정보보호교육 STEAM 프로그램 개발 및 적용)

  • Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.3
    • /
    • pp.273-282
    • /
    • 2016
  • The new STEAM program suggested in this paper aims at helping students to have interest in information security engineering experts and to design their career creatively through the project on future promising career. The program was designed to help teachers and students understand the jobs and capabilities required for information security experts through direction and execution of the information security expert project. Teaching tools of information security through simulation hacking play activities based on hexagon cell is designed to provide students with the chance to indirectly experience the job of a computer security expert through an unplugged education. Because the content of cyber security is unfamiliar and difficult to understand, the program is designed to allow students to access the key principle of the job, rather than to describe the technical part. Using this program, students will be able to communicate with each other to solve the problems, to have interest in computer security experts, and to design their careers in a creative manner.

Information Security Job Skills Requirements: Text-mining to Compare Job Posting and NCS (정보보호 직무 수행을 위해 필요한 지식 및 기술: 텍스트 마이닝을 이용한 구인광고와 NCS의 비교)

  • Hyo-Jung Jun;Byeong-Jo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.179-197
    • /
    • 2023
  • As a sufficient workforce supports the industry's growth, workforce training has also been carried out as part of the industry promotion policy. However, the market still has a shortage of skilled mid-level workers. The information security disclosure requires organizations to secure personnel responsible for information security work. Still, the division between information technology work and job areas is unclear, and the pay is not high for responsibility. This paper compares job keywords in advertisements for the information security workforce for 2014, 2019, and 2022. There is no difference in the keywords describing the job duties of information security personnel in the three years, such as implementation, operation, technical support, network, and security solution. To identify the actual needs of companies, we also analyzed and compared the contents of job advertisements posted on online recruitment sites with information security sector knowledge and skills defined by the National Competence Standards used for comprehensive vocational training. It was found that technical skills such as technology development, network, and operating system are preferred in the actual workplace. In contrast, managerial skills such as the legal system and certification systems are prioritized in vocational training.

산업보건관련 기록의 표준화를 위한 연구 - 산업장 건강관리실 기록지를 중심으로 -

  • Go, Bong-Ryeon;An, Min-Seon
    • Korean Journal of Occupational Health Nursing
    • /
    • v.1
    • /
    • pp.52-77
    • /
    • 1991
  • 본 연구는 산업보건관련기록의 표준화를 위하여 산업장 건강관리실 기록지를 수집하여 기록의 종류, 내용과 양식을 비교 분석하므로써 간결하고 유용하고 필요한 정보를 효율적으로 제공할 수 있는 기록을 개발코자 조사연구한 것이다. 조사대상은 총 32개 산업체로써 조사기간은 1991년 2월 4일부터 4월 6일까지이며 자료 수집 방법은 우편을 이용하였다. 조사결과는 다음과 같다. 1. 근로자의 건강관련 정보기록으로 일일업무기록은 모두 쓰고 있었으며, 의약품 보호구 수불현황은 65.6%에서 사용하였고, 개인건강기록부, 매월업무보고서, 진료의뢰서는 각각 40.6%, 21.9%, 28.1%에서 사용하였다. 2. 간호사의 건강관리 업무관련정보기록은 일일간호 및 처치기록은 84.4%가 사용하였고, 현장순회일지, 환경위생점검일지 사용이 가장 낮았으며, 건강상담일지, 보건교육일지, 건강관리대상자 관리현황, 공상자 치료 및 관리현황은 제조업인 경우에는 21~26%가 사용하였고 기타 사업장인 경우에는 업거나 사용율이 매우 저조하였다. 산업안전보건법에 의한 사업장의 순회점검 지도 및 조치의 건의사항이나 작업환경개선 및 유지, 관리에 관한 사항을 수행하기 위해서는 현장순회일지나 환경위생점검일지에 대한 기록이 정확히, 철저히 이루어져야 될 것으로 생각된다. 또한 상담 및 보건교육일지 작성도 보건교육이 전반적인 산업보건 사업계획과 통합되고 지속적으로 이루어지기 위해서는 표준화된 기록양식을 개발해야 할 것으로 생각된다. 기록양식의 내용을 업종별 중요성에 따라 표준화된 기록지 개발을 제언한다.

  • PDF

A Study on Practice of Protective Actions for Medical Information - A comparison between hospital administrators and occupational therapists - (의료정보 보호행동 실천에 관한 연구 - 병원행정관리자와 작업치료사를 비교 -)

  • Kweon, Eun-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1959-1970
    • /
    • 2013
  • Attempts were made in this paper to compare the practice of protective actions for information of patients' medical treatment between hospital administrators who do not make direct contact with patients and occupational therapists who usually do. The comparison between jobs in charge showed that occupational therapists did not practice much protective actions for information of patients' medical treatment ($3.52{\pm}.809$) compared to hospital administrators ($3.92{\pm}.724$), even though the former had received regular education about protection, management and supervision of patients' medical information more often ($3.17{\pm}1.129$) than the latter ($3.16{\pm}1.037$). In spite of the fact that occupational therapists were exposed frequently to the danger of revealing medical information in the process of their job performance through talks and communications with patients, they displayed relatively little concern for and awareness of keeping information of medical treatment from being leaked by them. It is thus suggested to promote awareness of medical staff to protect medical information by means of flexible educational system for each occupational group, periodical monitoring, continuing public relation, training and quality control for protection of medical information, as well as routine self-examination of such practice.

The Construction of Job Exposure Matrix (직무 - 노출매트릭스의 설계)

  • Yim, Hyeon Woo;Roh, Youngman;Lee, Won Chul
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.11 no.2
    • /
    • pp.161-168
    • /
    • 2001
  • The types of exposure data needed in an industry-based study depend on the diseases of interest and the study design to be used. The best situation occurs when we have quantified personal exposure estimates for the agents of interest, the least informative case occurs when we have only knowledge of the fact of employment in a plant, industry, or trade where exposure probability is high. Exposure information for most industry-based studies falls somewhere between these tow extremes. Job exposure matrices(JEM) are designed to link information on occupation with information on exposure to specific workplace hazards. Some forms of systematic error of bias may be less likely to occur in studies that utilize job-exposure matrices to indirectly infer exposures from job titles than in studies that assess exposures by asking subjects about their past exposure. JEM can be used effectively in industry-based studies for historic cohort studies, case-control study to assist with the retrospective assessment of occupational exposures among workers whose individual exposure histories are unavailable. JEM generally consist of a computerized database that links information about job categories and likely exposures. These two major axes may be stratified by calendar time. This article reviews the design of JEM in support of industry-based studies. Specific matrices may find broader applicability along with the increasing availability of detailed hygienic data.

  • PDF

Current status analysis for the protection of emotional workers in Pyeongtaek area (평택지역 감정노동자 보호를 위한 현황분석)

  • Jung, Hye Jung;Jung, Su Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.55-60
    • /
    • 2021
  • In order to prepare basic data for research on the protection of emotional workers in Pyeongtaek with the support of Pyeongtaek City, this study conducted a survey centered on 104 counselors classified as emotional laborers. Based on the results of the survey centered on 104 emotional workers, basic research data on the difficulties of emotional workers can be prepared, and protection methods for emotional workers who are currently interested in each local government can be found. As a result of selecting a sample centering on counselors in Pyeongtaek City for a survey on the actual condition of emotional workers, and conducting a survey based on the selected samples, it was found that emotional workers did not find their rights to human rights and were not protected even in the workplace. Currently, a bill to protect emotional workers is being announced, but it is not protected, so it is confirmed that system improvement is necessary. This study focused on 104 items that were significant through pre-processing among the recovered questionnaires. It was analyzed using SPSS, R, and it was confirmed that there is a need for a regulation that can provide an institutional device in Pyeongtaek City. In this study, it is judged that it is necessary to prepare a protective device for emotional workers by selecting more samples corresponding to the occupational group of emotional workers.

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

Effect of Career Group Counseling Program on Career Attitude Maturity and Career Decision-Making Self-Efficacy of Adolescents on Probation (진로집단상담프로그램이 보호관찰소 청소년의 진로태도성숙도와 진로결정자기효능감에 미치는 영향)

  • Heo, Jeong-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.154-164
    • /
    • 2015
  • The aim of this study is to analyse the effects of a career group counselling program on career attitude maturity and career decision self-efficacy in adolescents under probation. As a result, it was discovered that the career group counselling program had statistically significant differences in reality and preparedness among the sub-areas of career attitude maturity while there were no significant differences in determinacy. Also, the career group counselling program had statistically significant differences in goal selection, job information and future plans among the sub-area of career decision self-efficacy while there were no significant differences in problem solution. These results suggest that the career group counselling program had significant effects on career attitude maturity and career decision self-efficacy. For better career attitude maturity and career decision self-efficacy in adolescents under probation, more organized studies on career group counselling programs are needed and their usability should be reinforced.

The Reliability Evaluation of User Account on Facebook (페이스북 사용자 계정의 신뢰도 평가에 대한 연구)

  • Park, Jeongeun;Park, Minsu;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1087-1101
    • /
    • 2013
  • Most people are connected to Social Network Services (SNS) through smart devices. Social Network Services are tools that transport information fast and easily. It does not care where he or she comes from. A lot of information circulates and is shared on Social Network Services. but Social Network Services faults are magnified and becoming a serious issue. For instance, malicious users generate multiple IDs easily on Facebook and he can use personal information of others on purpose, because most people tend to undoubtedly accept friend requests. In this paper, we have specified research scope to Facebook, which is one of most popular Social Network Services in the world. We propose a way of minimizing the number of malicious actions on Facebook from malignant users and malicious bots by setting criteria and applying reputation system.

A Study on Strategic Development Approaches for Cyber Seniors in the Information Security Industry

  • Seung Han Yoon;Ah Reum Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.73-82
    • /
    • 2024
  • In 2017, the United Nations reported that the population aged 60 and above was increasing more rapidly than all younger age groups worldwide, projecting that by 2050, the population aged 60 and above would constitute at least 25% of the global population, excluding Africa. The world is experiencing a decline in the rate of increase in the working-age population due to global aging, and the younger generation tends to avoid difficult and challenging occupations. Although theoretically, AI equipped with artificial intelligence can replace humans in all fields, in the realm of practical information security, human judgment and expertise are absolutely essential, especially in ethical considerations. Therefore, this paper proposes a method to retrain and reintegrate IT professionals aged 50 and above who are retiring or seeking career transitions, aiming to bring them back into the industry. For this research, surveys were conducted with 21 government/public agencies representing demand and 9 security monitoring companies representing supply. Survey results indicated that both demand (90%) and supply (78%) unanimously agreed on the absolute necessity of such measures. If the results of this research are applied in the field, it could lead to the strategic development of senior information security professionals, laying the foundation for a new market in the Korean information security industry amid the era of low birth rates and longevity.